Beruflich Dokumente
Kultur Dokumente
11 WLAN
CONTENTS :
IEEE 802.11 architecture
Architecture components
802.11 layers description
The basic access method CSMA/CA
Fragmentation and reassembly
Inter frame space
INTRODUCTION
802.11 (WiFi) wireless accesses, users face with the
necessity of maintaining a continuous connection to
the network while moving.
IEEE 802.11 WLAN provide not only convenient
network connectivity but also a high speed link up to
11 Mbps (802.11b). we are concerned with the IEEE
802.11b network which operates in the 2.4 GHz band.
In this band, a proper deployment typically uses only
the three non overlapping independent channels (1, 6,
and 11).
The transmission range of a typical WiFi device is upto
100m and can emit the power upto 20dBm(or 100mW)
MAC layer responsibilities are divided into MAC sub layer and
MAC management sub-layer.
802.11 LAYERS
DESCRIPTION
802.11 protocol covers the MAC and Physical layer,
the standard currently defines a single MAC which
interacts with three PHYs.
Frequency Hoping Spread Spectrum in the 2.4GHz
band (FHSS)
Direct Sequence Spread Spectrum in the 2.4GHz band
(DSSS)
InfraRed (IR)
LOGICAL SERVICE
INTERFACES
Services Specified by IEEE 802.11
A point-to-point bridge connecting LANs in two
separate buildings could become a DS.
While the implementation for the DS is not
specified, 802.11 does specify the services, which
the DS must support. Services are divided into
two sections
Station Services (SS)
Distribution System Services (DSS)
State Variables :
Each wireless station maintains two state
variables, one for authentication and one for
association. A wireless station is authenticated or
unauthenticated. Once in an authenticated state,
the STA is either associated or unassociated.
These variables create three states:
State 1: Unauthenticated and unassociated.
State 2: Authenticated, not associated.
State 3: Authenticated and associated.
The state of the wireless station determines which
MAC frames are admissible. This information could
be useful when debugging with a packet sniffer.
SCANNING METHODS
There are two kinds of scanning
methods defined in the
standard: active and passive.
PASSIVE SCANNING:
1. Scanning is the first step for the
MC(Mobile Clients) to join an Aps
network.
2. In the case of passive scanning
the client just waits to receive a
Beacon Frame from the AP
3. MC (Mobile Clients) searching for
a network by just listens for
beacons until it finds a suitable
network to join.
ACTIVE SCANNING:
1. The MC (Mobile Clients) tries to
locate an AP by transmitting
Probe Request Frames , and waits
for Probe Response from the AP.
2. The probe request frame can be
a directed or a broadcast probe
request.
3. The probe response frame from
the AP is similar to the beacon
frame.
4. Based on the response from the
AP, the client makes a decision
about connecting to the AP
Optimization of scanning
latency
One simple way to reduce the full scanning
SELECTIVE SCANNING
PROCEDURE
SCANNING STRATEGIES
values for both MinCT and MaxCT, which determine the time
an MS will wait on a channel for APs responses. Low values
will provide low full scanning latency, but will increase the
risk of missing AP since the MS does not wait long enough to
get a response.
ADAPTIVE TIMERS SCANNING:
DATA TRANSFER
MECHANISM
Data transfer allowed only after authentication
and association.
Attempting to send data to an AP without proper
authentication and association causes AP to
respond with a de-authentication frame.
Data frames are always acknowledged. If a client
sends a data frame to an AP, the AP must send an
acknowledgement. If the AP sends a data frame
to a client, the client must send an
acknowledgement
The AP will forward data frames received from the
client to the required destination on the wired
network. It will also forward data directed to the
client from the wired network.
THE HANDOFF
A Handoff occurs when a mobile station moves
beyond the radio range of one AP, and enters
another BSS (at the MAC layer). During the
handoff, management frames are exchanged
between the station (STA) and the AP.
Also the APs involved may exchange certain
context information (credentials) specific to the
station. Consequently, there is latency involved in
the handoff process during which the STA is
unable to send or receive traffic.